where ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal
|
|
- Marilynn Fletcher
- 5 years ago
- Views:
Transcription
1 814 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 5, MAY 2014 Uniform Embedding for Efficient JPEG Steganography Linjie Guo, Student Member, IEEE, Jiangqun Ni, Member, IEEE, and Yun Qing Shi, Fellow, IEEE Abstract Steganography is the science and art of covert communication, which aims to hide the secret messages into a cover medium while achieving the least possible statistical detectability. To this end, the framework of minimal distortion embedding is widely adopted in the development of the steganographic system, in which a well designed distortion function is of vital importance. In this paper, a class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side-informed secure JPEG steganography. By incorporating the syndrome trellis coding, the best codeword with minimal distortion for a given message is determined with UED, which, instead of random modification, tries to spread the embedding modification uniformly to quantized discrete cosine transform (DCT) coefficients of all possible magnitudes. In this way, less statistical detectability is achieved, owing to the reduction of the average changes of the first- and second-order statistics for DCT coefficients as a whole. The effectiveness of the proposed scheme is verified with evidence obtained from exhaustive experiments using popular steganalyzers with various feature sets on the BOSSbase database. Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis. Index Terms JPEG steganography, minimal-distortion embedding, uniform embedding, distortion function design. I. INTRODUCTION STEGANOGRAPHY is the science and art of covert communication where the sender embeds secret message into an original image (cover) with a shared key to generate a stego image. To conceal the very existence of communication, the stego image has to be statistically undetectable from its cover counterpart [1]. Therefore, the two conflicting objectives, i.e., undetectability and embedding payload, should be carefully considered when devising a steganographic scheme. Denote Manuscript received August 18, 2013; revised January 6, 2014 and February 20, 2014; accepted March 4, Date of publication March 20, 2014; date of current version April 10, This work was supported in part by the National Natural Science Foundation of China under Grants and , in part by the National Research Foundation for the Doctoral Program of Higher Education of China under Grant , and in part by the Key Program of Natural Science Foundation of Guangdong under Grant S The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Patrick Bas. L. Guo and J. Ni are with the School of Information Science and Technology, Sun Yat-sen University, Guangzhou , China ( g.linjie@gmail.com; issjqni@mail.sysu.edu.cn). Y. Q. Shi is with the Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ USA ( shi@njit.edu). Color versions of one or more of the figures in this paper are available online at Digital Object Identifier /TIFS x R n and y R n as the cover and stego images, respectively. We then define the cost (or distortion) function of making an embedding change at i-th element of x from x i to y i as ρ i (x i, y i ),where0 ρ i <. Under the additive distortion model, the total impact caused by the embedding can be expressed as the sum of embedding cost over all elements, i.e., D (x, y) = n i=1 ρ i (x i, y i ). In practice, the problem of designing a secure steganographic scheme can be formulated as the minimal distortion embedding, i.e., to minimize the total embedding distortion D for a given payload. With properly designed ρ i, the total statistical artifacts caused by the embedding are minimized and the resulting stego objects can be made less detectable. As JPEG is the most widely used format for digital image storage and transmission, JPEG steganography has become the domain of extensive research. It has witnessed the development of a lot of schemes for JPEG steganography over the last decade, such as F5 [2], nsf5 [3], MME [4] and some recently emerged adaptive ones [5] [7]. All of these schemes can be described with a unified framework the minimal distortion embedding framework, which consists of the coding unit and the distortion function. In the F5, the embedding impact is treated equally for each coefficient. As a result, minimizing the total distortion for a given payload corresponds to the effort to minimize the number of coefficients to be modified, or maximize the embedding efficiency, i.e., the number of message bits embedded per embedding change. The security performance of F5 was improved by increasing its embedding efficiency through matrix encoding, which can be viewed as a special case of the minimal distortion embedding framework with the embedding cost being identical for each coefficient. In [3], the wet paper code (WPC) is incorporated in nsf5, improved version of F5, to tackle the issue of shrinkage with F5, resulting in significant improvement in coding efficiency compared to the Hamming code used in F5. In the MME, for JPEG steganography, the advantage of the side-information of the original uncompressed image is taken to construct the distortion function, furthermore, only those coefficients with less distortion are selected to be modified, and more coefficients may be modified compared with the matrix coding. Later, Sachnev et al. proposed in [5] another efficient JPEG steganographic scheme, denoted as BCHopt, based on heuristic optimization and fast BCH syndrome coding. Compared with the MME, the BCHopt takes into account not only the rounding error but also the quantization step in the construction of distortion function, thus leading to significant improvement in security performance against steganalysis. The IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See for more information.
2 performance gain of both MME and BCHopt stems largely from the original BMP image as precover, which is, however, not always available in practice. In [1], Filler et al. proposed to use syndrome trellis coding (STC) as a practical approach for the implementation of minimal distortion embedding framework. They have shown that, under the additive distortion model, the STC can achieve asymptotically the theoretical bound of embedding efficiency for a user-defined distortion function. With the emergence of this efficient coding method, it is increasingly recognized in the steganographic community that further substantial increase in secure payload for steganography is more likely achieved by properly designing the distortion function rather than improving the coding scheme itself. In [6], Filler and Fridrich proposed a rich parametric model for the embedding cost at a specific coefficient by taking into account both the coefficient itself and its neighborhoods. By incorporating the STC, they optimized the constructed cost model with respect to the popular steganalysis feature set CC-PEV-548D [8]. The experimental results showed that the proposed distortion function, a.k.a. Model Optimized Distortion (MOD), can significantly improve the secure payload in DCT domain. However, as reported in a later paper by Kodovský et al. [9], the security performance of MOD can be drastically degraded as the distortion is optimized w.r.t. an incomplete feature space. By enlarging the corresponding parts of CC-PEV model, the MOD can be reliably detected by the IBC-EM feature set [9], and even becomes less secure than the heuristically designed nsf5. More recently, Holub and Fridrich proposed a universal distortion design called UNIWARD [10], in which the distortion functions for spatial (S-UNI), JPEG (J-UNI) and side-informed JPEG (SI-UNI) domain are derived from the wavelet domain. Unlike the conventional JPEG steganographic schemes which only embed the secret message into non-zero AC coefficients, the UNIWARD uses all DCT coefficients (DCs, zero and non-zero ACs) as possible cover elements for steganography, thus achieves so far the best security performance. Corresponding to the development of JPEG steganography, substantial progress has also been made recently in JPEG steganalysis. In [11], Kodovský and Fridrich suggested using a rich model with a large feature set of up to 22,510-D for steganalysis. By using the ensemble classifier [12], the rich model based steganalysis can detect most existing JPEG steganographic algorithms with a high accuracy. Consequently, the secure payload of JPEG steganography is decreased substantially, which poses new challenges on modern JPEG steganography. Therefore, there is an increasing need to develop more secure JPEG steganography algorithms. In general, a good JPEG steganographic scheme involves two aspects, i.e., an efficient steganographic coding unit and an effective distortion function which is correlated with the statistical detectability. In this paper, we focus on the design of a new additive distortion function for JPEG steganography. By following the concept in spirit of spread spectrum communication, the proposed distortion function is designed so as to guide the stego system to uniformly spread the embedding modification to the quantized DCT coefficients of all possible magnitudes. This results in possible minimal artifacts of first- and second-order statistics for DCT coefficients as a whole. It is noted that, for non side-informed JPEG steganography, our proposed distortion function is derived directly from the quantized block DCT coefficients without any premodel training. An efficient JPEG steganographic scheme is then developed by incorporating the new distortion function in the STC framework, which works quite well against the popular steganalyzers with various feature sets, e.g., CC-PEV-548D [8], IBC-EM-882D [9], MP-486D [13], and the recently emerged state-of-the-art feature set, CC-JRM- 22,510D [11]. In addition, if available, the original BMP image can be used as precover (side information) to further improve the security performance of our method. As an extension of our previous work in [14], this paper includes several new contributions: 1) the detailed analysis why the proposed UED function can lead to less average changes of second-order statistics besides the first-order ones; 2) the analysis of the allowable modification (embedding) rate of DCT coefficients with different magnitude from the perspective of natural image model; 3) the new scheme for side-informed JPEG steganography; and 4) implementation of all the experiments on the new BOSSbase [15] image database, which is widely considered as a more appropriate benchmark to evaluate the performance of the steganographic and steganalytic schemes. The remainder of this paper is organized as follows. In Section II, the adaptive steganographic framework for minimal distortion embedding is briefly reviewed. The proposed distortion function and the new JPEG steganographic scheme are presented in Section III and IV, respectively, which are followed by the experimental results and analysis in Section V. Finally the concluding remarks are summarized in Section VI. II. PRACTICAL MINIMAL DISTORTION EMBEDDING FRAMEWORK In steganography, the transmitter uses seemingly innocent media, e.g., digital images, to hide her messages and communicate with the receiver. In this way, it is hard to distinguish the stego media from the cover one, and thus covert communication can be achieved. In the literature, the message is generally hidden (embedded) in the cover image by slightly modifying some individual elements of cover, such as LSBs of pixels and quantized DCT coefficients. The problem of minimizing the embedding impact for single-letter distortion is well formulated in [1]. Let the binary vector x b = [x b1, x b2,...,x bn ], y b = [y b1, y b2,...,y bn ] {0, 1} n and m = [m 1, m 2,...,m k ] {0, 1} k be the LSB vector of cover x, LSB vector of stego y and message, respectively, we have the additive cost function as n D (x, y) = ρ i (x, y i ), (1) i=1 where ρ i (x, y i ) denotes the cost of changing the i-th cover element from x i to y i. With the syndrome coding, the minimal
3 Fig. 1. Comparison of statistics changes between nsf5 and the UED. (a) and (b) are the DCT coefficients histogram and the co-occurrence matrix of neighboring DCT coefficients for cover images. (c) and (d) are the histograms for the modified coefficients with nsf5 and the proposed scheme at 0.2 bpac, respectively. (e) and (g) are changes in statistics of (a) and (b) with nsf5. (f) and (h) are changes in statistics of (a) and (b) with the proposed scheme. distortion embedding framework is formulated as Emb(x, m) = arg min D (x, y) y b C(m) and H y b = m, (2) where H is parity-check matrix of the code C and C (m) is the coset corresponding to syndrome m. In the minimal-distortion embedding framework, most existing coding methods including Hamming code, BCH code and STC can be adopted. For practical design of steganography, the performance of coding method can be well evaluated using the metric of coding loss defined as the relative decrease in payload due to practical coding [1]: l(d ε ) = m MAX m, (3) m MAX where m is the payload embedded by a given algorithm and m MAX is the maximal payload embeddable with a distortion not exceeding D ε. Under this context, the Syndrome-Trellis Codes (STCs) [1] achieved an extremely low coding loss with l = 7% 14% depending on the parameter setting and thus is adopted in the construction of our proposed JPEG steganographic scheme. As for the distortion function, instead of training it against any specific feature set, we attempt to design a universal one to make the possible minimal artifacts of first- and secondorder statistics, which constitute the primitive elements of almost all feature sets for JPEG steganalysis. III. PROPOSED DISTORTION FUNCTION A. Motivation Behind Uniform Embedding Strategy To detect JPEG steganography, the statistics of quantized DCT coefficients are often exploited to construct feature set for steganalyzers. In practice, the histogram and the cooccurrence matrix of the block DCT coefficients are widely used in steganalysis. While the former relates to the firstorder statistics, and the latter corresponds to the second-order ones, which can capture the correlations among the DCT coefficients. Once a secret message (payload) is embedded into a JPEG image, the statistics of the DCT coefficients will be modified to some extent, which leaves trace for steganalysis. The impacts of data embedding on the statistics of DCT coefficients are well illustrated with nsf5 [3] as shown in Fig. 1. To be more specific, we randomly select 2,000 images from BOSSbase [15] and JPEG compress them with QF = 75. The average changes of statistics after steganography are then reported in Fig. 1. Fig. 1(a) shows the global histogram h of DCT coefficients X, and Fig. 1(b) corresponds to the co-occurrence matrix P (X 1, X 2 ) of coefficient X 1 and its neighboring one X 2 with offset d = (0, 1). For a given payload of 0.2 bpac, Fig. 1(c) shows the histogram of the DCT coefficients being selected to be modified by the nsf5 scheme, whereas Fig. 1(e) and (g) report the changes of h and P (X 1, X 2 ) after nsf5 embedding, respectively. As shown, most of the modifications of DCT coefficient are observed around bin zero. To gain insights on the artifacts we observe in Fig. 1, we now analyze how nsf5 works. For a given payload α, nsf5 embedding simulator [3] first calculates the theoretical bound of the embedding efficiency, and obtain the number n of the coefficients to be modified. Then, it randomly selects n nonzero AC coefficients and decreases their absolute value by 1. We use p (x) and p nz (x) to denote the empirical probability density function (PDF) of the AC and nonzero AC coefficients, respectively. There are n p nz (x) AC coefficients at bin x that needs to be modified. Therefore, we can express the change of PDF due to message embedding as p(x)= { n [p se1 (x 1)+ p se1 (x +1)]/N if x = 0 n [p se1 (x +sgn(x)) p se1 (x)]/n if x = 0, (4)
4 where p sel (x) = p nz (x) is the probability that coefficient x is selected and N denotes the total number of all the block DCT coefficients. Considering the fact that the block DCT coefficients are approximately Laplacian distributed and the random selection nature of nsf5, the coefficients to be modified are most likely those with small magnitude. As a result, most of the coefficient modifications due to this embedding strategy occur around bin zero. As observed in Fig. 1(c), most of the coefficients to be modified are located within bins of absolute value 2. According to (4), the changes of statistics in bin 0 and ±1 arising from random embedding are significantly larger than the ones in other bins as shown in Fig. 1(e). By exploiting the mentioned distribution artifacts of DCT coefficients with small magnitude ( X T ), even when the threshold T = 2, most existing JPEG steganalyzers, e.g., CC-PEV-548D [8] can detect JPEG steganography with high accuracy. For JPEG steganography, although the number of modified coefficients would be reduced if a more efficient coding strategy is adopted, the distribution of the modified coefficients, however, would remain similar after embedding. As a result, the substantial statistical artifacts of small DCT coefficients can still be made use of to detect stego JPEG images, especially when relative large data payload is required. To avoid the sudden change of statistics in small DCT coefficients, uniform embedding (UE) as formulated in (5) is more preferable rather than the random embedding strategy. p sel (x +sgn(x)) = p sel (x), x { 1024,..., 1, 1,...,1024}. (5) The uniform embedding strategy tries to spread the embedding modifications to coefficients of all possible magnitudes so as to minimize the statistics change in each bin, i.e., p(x +sgn(x)) = p(x), x { 1024,..., 1, 1,...,1024}. (6) To embed a given message M, let M be the total modifications, and RN and UN be the bin numbers involved in random and uniform embedding, respectively. The spread magnitude nature of uniform embedding makes UN RN, therefore the average modification per bin ( M / UN) for uniform embedding is much less than one ( M / RN) for random embedding. Note that, unlike OutGuess [16], our scheme seeks to minimize the change of the first-order statistics as well as the higher order ones. Take the P(X 1, X 2 ) in Fig. 1(b) for example, where a co-occurrence matrix (i.e., X i 10, i = 1, 2) averaged over 2,000 JPEG compressed images (QF = 75) is illustrated. The uniform embedding approach allows the modifications spreading over all quantized coefficients of different magnitudes, thus minimizing the change of each entry of P(X 1, X 2 ) asshowninfig.1(h). In addition, the proposed scheme neither modifies the zerocoefficients nor creates new zero-coefficients. In practice, the uniform embedding strategy can be implemented using STC [1]. To embed a given message, the STC provides multiple codewords, among which, a distortion function is then incorporated to choose the one with the least Fig. 2. Schematic illustration of the uniform embedding strategy. Curve a is the distribution of DCT coefficients. Curve b is the selection probability of each coefficient with UED. Curve c is the distribution of the selected coefficients. distortion. To be able to accomplish the uniform embedding, the involved distortion function should be designed so that the coefficients of different magnitude are selected with equal priority. In the following, we refer to such function as uniform embedding distortion function (UED). Let x denote the DCT coefficient, which is Laplacian distributed as shown in Fig. 2 (c.f. curve marked with a ). The distortion function used in UED should have the form of ρ (x) = 1 / x, i.e., the selection probability of a coefficient x is monotonically increased with its magnitude x as shown by the curve b in Fig. 2. Curve c in Fig. 2 shows the approximately uniform distribution of selected DCT coefficients when the UED is applied, which also corresponds to the less statistical detectability. B. Model of Natural Image It is obvious that the DCT coefficients with large amplitude tend to be modified more heavily than previous approaches, such as nsf5, when the strategy of uniform embedding is adopted. We then proceed to investigate the allowable modification (embedding) rate of DCT coefficients with different magnitude from the perspective of image model. The existing steganalysis analyzers for JPEG image generally take advantage of natural image model in terms of first- and second-order statistics of quantized DCT coefficients for steganalysis. If the distribution of DCT coefficients can be exactly characterized by some kind of image models, then any slight modification of the cover image will be reliably detected. Fortunately, the distributions of the DCT coefficients for natural images depend heavily on the image contents and vary from one to another. In other words, the statistics of natural images indeed exhibit, to some extent, deviation away from their models of any kinds, which are what the potentials of natural images left for steganography. To justify the deviation of natural images in terms of first- and second-order statistics, we again randomly selected 2,000 JPEG images from the image database BOSSbase [15]. The histogram of DCT coefficients p(x) of each image is first calculated. And the mean value μ(x) and standard deviation σ(x) of p(x) are then obtained, respectively, as shown in Fig. 3(a) and (b). The existence of σ(x) indicates the dispersion of natural images in first-order statistics, which is more appropriate to be measured using the normalized coefficient of variation (CV) [17] defined as the ratio of the standard deviation to the mean: Cv(x) = σ(x) μ(x). (7)
5 Fig. 3. (a) (c) and (d) (f) are the mean, standard deviation and CV of p(x) and P(X 1, X 2 ) over 2,000 JPEG image, respectively. As is shown in Fig. 3(c), Cv(x) increases with x, which implies that, for natural images, the histogram of quantized DCT coefficients p(x) tends to deviate heavily when the magnitude of coefficients (i.e., x ) increase. Therefore, if the relative modification rate of each x is proportional to its CV so as to make the uniform modification across all x, the statistical impact in first-order statistics could be minimized. The similar effect is also observed with second-order statistics of natural images. Let P(X 1, X 2 ) denote the cooccurrence matrix with offset d = (0, 1). Fig. 3(d) (f) show the mean μ(x 1, X 2 ), standard deviation σ(x 1, X 2 ) and normalized coefficient of variation Cv(X 1, X 2 ) of P(X 1, X 2 ) over 2,000 JPEG images with QF = 75, respectively. Obviously, Cv(X 1, X 2 ) also increases with the increase of X 1 + X 2. In other words, it is more difficult to model the second-order statistics of DCT coefficients when X 1 + X 2 gets larger. Therefore, the statistical impact of modifying a DCT coefficient x depends on its own magnitude x as much as on the magnitudes of its neighboring coefficients. C. Distortion Function for the Uniform Embedding Strategy 1) Single Coefficient Based Uniform Embedding Distortion: Let c ij denote the DCT coefficient at (i, j), the distortion function of form 1 / cij is well explained with the concept of uniform embedding. It is intuitive to define the single coefficient based uniform embedding distortion function (SC-UED) as below: ρij SC = cij 1. (8) With SC-UED and the STC framework, for 2,000 JPEG images with QF = 75, the statistics changes after steganography of 0.2 bpac are also shown in Fig. 1. It is observed that the selected coefficients are much more uniformly distributed [Fig. 1(d)] than the ones with random selection of nsf5 [Fig. 1(c)]. Compared to Fig. 1(e) and (g) of nsf5, the uniform embedding has a quite uniform distribution and much less average changes in first- and second-order statistics, e.g., the global histogram and co-occurrence matrix with offset d = (0, 1), as shown in Fig. 1(f) and (h). No notable sudden changes in statistics are observed, especially in the region of small coefficients, say, [ 2, 2]. 2) Joint Coefficients Based Uniform Embedding Distortion: The SC-UED is employed to effectively relieve the sudden statistical changes, especially for the first-order statistics, due to random embedding. To survive the attacks of existing and emerging steganalysis tools [8], [11], [13], a better distortion function should be devised to allow a more uniform change of both first- and second-order statistics. For JPEG steganalysis, the second-order statistics of the DCT coefficients are generally characterized with co-occurrence matrix, i.e., P(X 1, X 2 ), where X 1 and X 2 are the quantized DCT coefficient and its neighboring one with offset d, respectively. Following the concept of SC-UED, and noting the fact that the quantized DCT coefficient pair (X 1, X 2 ) is generally 2-D Laplacian distributed, the (X 1, X 2 ) with larger magnitude should be modified with priority during embedding. Therefore, to design the practical UED for a quantized DCT coefficient, besides the magnitude of the DCT coefficient itself, the ones of its intra- and inter-block neighborhood coefficients which are assumed to have the strongest magnitude correlation with the coefficient under consideration, should be taken into account. The developed distortion function is known as the joint coefficients based uniform embedding distortion (JC-UED) and
6 Fig. 4. (a) (b) are changes of co-occurrence matrix with offset d = (0, 1) and d = (0, 8) of SC-UED, respectively. (c) (d) are same statistics changes of JC-UED. The payloads are both 0.2 bpac. described in (9) ρij JC = ( ) cij 1 + dia + α ia d ia N ia + d ir N ir ( c ij + d ir + α ir ) 1, (9) where N ia = {c i+1, j, c i 1, j, c i, j+1, c i, j 1 } and N ir = {c i+8, j, c i 8, j, c i, j+8, c i, j 8 } are intra- and inter-block neighborhoods of coefficient c ij, respectively. When the considered coefficient c ij is located in the image boundary, the nonexistent coefficients are removed from (9) accordingly. α ia and α ir are adjustment parameters and determined experimentally as 1.3 and 1, respectively, as in [14]. The way how these two parameters are experimentally determined is as below: 1) Randomly select 2,000 images from the image database described in [14], and set a fixed payload (e.g. 0.3 bpac); 2) Estimate the error probability with the CC-JRM features utilizing the ensemble classifier on the grid: A ia A ir, where A ia = {0, 0.1,...,1.9, 2} and A ir ={0, 0.1,...,1.9, 2}; 3) Select the best parameter pair with the minimum error probability as α ia and α ir. According to our experiments, the variations of the estimated parameters α ia and α ir are little for different image database. Fig. 4 shows the changes of second-order statistics with different distortion functions, where Fig. 4(c) and (d) are changes of co-occurrence matrix of offset d = (0, 1) and d = (0, 8) with JC-UED, compared with ones of the same offset with SC-UED in Fig. 4(a) and (b), suggesting that the JC-UED can well improve the sudden changes of the second-order statistics changes. Or, in other words, the JC-UED makes both the first- and second-order statistics change more uniformly. 3) Side-Informed Uniform Embedding Distortion: In general, the original BMP image as side-information can help to design efficient JPEG steganographic scheme [4], [5], [7]. Although the original BMP image is not necessary in the construction of UED, it is expected that the performance of the proposed scheme can be greatly improved by taking into account the side-information when it is available. The developed distortion function is referred to as side-informed uniform embedding distortion (SI-UED), which should satisfy both the requirements of uniform embedding and minimizing the absolute distortion, i.e., the additional rounding error as well. With the original BMP image, the rounding error R due to JPEG compression and the embedding error R due to data embedding are readily obtained. Thus we have the resulting additional rounding error E = R R, which is incorporated in the construction of SI-UED and has to be minimized. As a result, the SI-UED is defined as ρ SI ij = e ij [ d ia N ia ( c ij + d ia +α ia ) 1 + d ir N ir ( c ij + d ir +α ir ) 1], (10) where e ij is the additional rounding error for c ij, α ia and α ir are adjustment parameters determined experimentally as 0.2 (obtained using the similar procedure described in the previous subsection), other parameters are similarly defined as the ones in (9). The MME [4] is the first side-informed JPEG steganographic scheme that tried to improve its security performance by minimizing the additional rounding error. According to [4], modifying the coefficients with rounding error closer to 0.5 leads to less additional rounding errors. The BCH [5] and EBS [7] are also side-informed schemes that utilizing the rounding error. The feasibility of the SI-UED is illustrated in Fig. 5, where the average distributions of rounding error, i.e., frequency vs. rounding error [Fig. 5(a), (c), (e), and (g)] and the average changes in global histogram [Fig. 5(b), (d), (f), and (h)] for MME, BCH, EBS and SI-UED over 2,000 images randomly selected from the BOSSbase with a payload of 0.3 bpac are included. For fair comparison, all the four schemes are STC coded. It is observed that all the four schemes tend to modify more coefficients with rounding error close to 0.5, whereas less coefficients with rounding error close to 0. Compared with Fig. 5(a) and (c), the SI-UED modifies a little bit more coefficients with rounding error close to 0. This is because the SI-UED has to take the uniform embedding strategy into account at the same time, which consequently leads to much less statistical changes as shown in Fig. 5(h). Fig. 5(b), (d), (f), and (h) are average changes in global histogram caused by the MME, BCH, EBS and SI-UED, respectively. Again, compared with SI-UED [Fig. 5(h)], it is noted that the other schemes give rise to a much more sudden changes in the bins around zero coefficient as shown in Fig. 5(b), (d), and (f), as nsf5 does, especially the MME. IV. PROPOSED JPEG STEGANOGRAPHIC SCHEME The objective of minimal distortion embedding framework is to improve the security performance of steganography.
7 Fig. 6. Proposed scheme. (a) Data embedding. (b) Data extraction. available for a more secure data embedding. Let c = { c } k and c = {c k } be the quantized DCT coefficients before and after rounding operation, respectively. Then the rounding error is obtained with r k = c k c k. Case 2: When the input image is in JPEG format, the entropy decoding is applied to generate the quantized DCT coefficients c directly. In both cases, we obtain the scrambled non-zero AC coefficients x from c by a shared key K, i.e., x = f nz (c, K) = {x k }, (11) Fig. 5. (a), (c), (e) and (g) are the average distribution of the rounding errors of the modified coefficients over 2,000 images for MME, BCH, EBS and SI-UED, respectively; (b), (d), (f) and (h) are average changes in global histogram over 2,000 images for MME, BCH, EBS and SI-UED, respectively. All of the four schemes are STC coded with a payload of 0.3 bpac. To this end, syndrome coding incorporating some distortion functions is employed, specifically the syndrome-trellis coding (STC) [1] for data embedding and the proposed distortion functions (JC-UED or SI-UED) for embedding efficiency optimization. Fig. 6 illustrates the unified framework for JPEG steganography with original BMP image (Case 1) or JPEG compressed image (Case 2) as input, which includes the process of data embedding and extraction. A. Data Embedding 1) Preprocessing: The preprocessing is adopted to generate the cover, i.e., the quantized DCT coefficients for data embedding. Case 1: When input image is original BMP image, the process starts from the implementation of JPEG compression. In this way, the side-information, i.e., the rounding error is where ( f nz () is the mapping function. Similarly x = f nz x, K ) = { x k} denotes the scrambled non-zero AC coefficients before rounding. 2) Embedding Operation: Let y = {y k } and be the scrambled stego DCT coefficients and embedding operation, respectively. For scrambled AC coefficients x = {x k }, we have y k = x k + k. Before evaluating the distortion of a modified coefficient, the embedding operation itself should be defined. Case 1: With the original BMP image, the embedding operation is defined as below, +1, if r k 0&x k = 1 1, if r k 0&x k = 1 k =. (12) 1, if r k > 0&x k = 1 +1, if r k > 0&x k = 1 The embedding error due to data embedding is r k = y k x k = x k + k x k = k + r k 1 + r k, if r k 0&x k = r k, if r k 0&x k = 1 = 1 + r k, if r k > 0&x k = r k, if r k > 0&x k = 1 1 r k, if r k 0&x k = 1 r k = 1 + r k, if r k 0&x k = 1 1 r k, if r k > 0&x k = r k, if r k > 0&x k = 1 { 1 + r k, if x k r k > 0& x k =1 =. (13) 1 r k, otherwise
8 Thus we have the resulting additional rounding error e k = r k { r k 1, if x k r k > 0& x k =1 =. (14) 1 2 r k, otherwise Case 2: When the side-informed original BMP image is not available, the embedding operation is simply defined as { sgn(x i ), if x k =1 k = ±1, if x k = 1. (15) In both cases, we increase the absolute value of those ±1 cover coefficients by 1 so that no additional zero DCT coefficients are created. 3) Distortion Calculation: Case 1: Compute the embedding distortion ρ ={ρ k } for each scrambled non-zero AC coefficient x k using the SI-UED defined in (10), where the additional rounding error is computed as (14). Case 2: Compute the embedding distortion ρ ={ρ k } for each scrambled non-zero AC coefficient x k using the JC-UED defined in (9). 4) STC Coding: Case 1: Since the embedding operation is deterministic as in (12) which is guided by the rounding error, we can only use the binary STC. Let the binary vector m = {m i } and x b = {x bi } be the secret message and LSB of cover x, respectively. With m, x b and its corresponding embedding cost ρ as input parameters, the binary STC coding [1] is then applied to embed secret message m to x. The output of STC is the stego x b for x b, which is then used to construct the modified pattern p = xor(x b, x b ) of scrambled non-zero AC coefficients x. Case 2: Unlike case 1, the embedding operation is nondeterministic as in (15) except that x k =1. Since embedding operation can randomly be +1 or 1, this allows us to use the ternary STC to further improve the security performance. With m, x and its corresponding embedding cost ρ as input parameters, the ternary STC coding [1] is then applied to embed secret message m to x. And the output of STC is directly the stego y. 5) Postprocessing: Case 1: Once the modified pattern p = xor(x b, x b ) is obtained, the cover x is modified with (16) to obtain stego y. k is defined in (12). { x k, if p k = 0 y k = (16) x k + k, if p k = 1 For both cases, the entropy coding is then applied to generate stego JPEG image after y is descrambled. B. Data Extraction 1) Preprocessing: For a stego JPEG image, the quantized DCT coefficients are obtained by entropy decoding, which are then scrambled with the shared key K to generate the scrambled non-zero AC coefficient y. 2) STC Decoding: The STC decoding (binary STC for Case 1 and ternary STC for Case 2) is then applied to extract the secret message m. V. EXPERIMENTAL RESULTS AND ANALYSIS In this section, experimental results and analysis are presented to demonstrate the feasibility and effectiveness of the proposed UED schemes. The comparisons with several state-of-the-art schemes, such as nsf5 simulator [3], Filler et al. s adaptive scheme with model optimized distortion (MOD) [6] and Holub et al. s J-UNI [10] for non sideinformed JPEG steganography, and, Kim et al. s modified matrix encoding (MME) [4], Wang et al. s block entropy weighted scheme (EBS) [7], Sachnev et al. s BCH and BCHopt [5], and Holub et al. s SI-UNI [10] for side-informed JPEG steganography, are included. Note that, in all the involved schemes, with the exception of J-UNI, SI-UNI and BCHopt, other schemes including the proposed UED embed the secret message only to the non-zero AC coefficients and fall into the realm of conventional JPEG Steganography. In our experiments, we concentrate on the comparison of the distortion functions for the involved schemes. Therefore, the Hamming code in MME and BCH code in BCH are replaced with STC in the interest of fair comparison. Moreover, the proposed SI-UED will utilize both STC and BCH code when compared with BCHopt in [5]. A. Experiment Setup All experiments are carried out on the image database BOSSbase [15]. The original database contains 10,000 images acquired by eight digital cameras in their RAW format (CR2 or DNG) and subsequently processed by converting to grayscale, and then resizing and cropping to the size of pixels using the script available from [15]. The images in BOSSbase are then JPEG compressed using quality factors 75, 85 and 95. Thus, we have four image databases each with 10,000 grayscale cover images of different texture characteristics in format of BMP and JPEG, which serve as the precover (BMP) and cover (JPEG) for side-informed and non sideinformed JPEG embedding, respectively. In our experiments, the payloads for both non side-informed and side-informed embedding range from 0.1 to 0.5 bpac with a step of 0.1. Several mainstream universal feature sets for JPEG steganalysis, such as the CC-PEV-548D [8], MP-486D [13] and the state-of-the-art CC-JRM-22,510D [11], are employed to evaluate the security performances of the involved JPEG steganographic schemes. Considering the proposed UED tends to spread the embedding to all possible quantized DCT coefficients with different magnitude, the IBC-EM-882D feature set in [9], which focuses on detecting the embedding changes to DCT coefficients with a large magnitude, is also included in our experiments. The ensemble classifier in [12] is incorporated in our experiments as is done in [11], since it enables fast training in high-dimensional feature spaces and has a comparable performance to that of SVMs [18] working on low-dimensional feature sets. Considering the CC-PEV-548D, MP-486D and IBC-EM-882D are originally designed for SVM, we also utilize the SVM as the classifier for these three feature sets. The parameters of SVM are set as in [8], [9], and [13], respectively. For the cover and their corresponding stego images with different steganographic schemes, embedding rates and
9 TABLE I D ETECTION E RRORS FOR THE I NVOLVED N ON S IDE -I NFORMED AND S IDE -I NFORMED S CHEMES ON BOSS BASE W ITH CC-PEV-548D, MP-486D AND IBC-EM-882D, AND E NSEMBLE AND SVM C LASSIFIERS F OR Q UALITY FACTORS 75 QFs, the feature sets for the involved steganalysis tools are extracted, where half of the cover and the stego features are used as the training set for both the ensemble and SVM classifiers, and the remaining half are used as test set to evaluate the trained classifier. The minimal total error PE under equal priors achieved on the test set is defined as PFA + PMD (PFA ), (17) 2 where PFA is the false alarm rate and PMD is the missed detection rate. The performance is evaluated using the median value of PE over ten random tests and is denoted as P E. PE = min PFA B. Performance of Non Side-Informed UED For JPEG steganography without side-information, we compare the proposed SC-UED and JC-UED with nsf5 [3], MOD [6] and the recently proposed J-UNI [10]. The security performances of the involved schemes against the CC-JRM-22,510D, for JPEG quality factors 75, 85 and 95, are illustrated in Fig. 7. For all cases, J-UNI achieves the best security performance as expected, while JC-UED clearly outperforms nsf5 as well as MOD by a sizeable margin across all three quality factors. We also report in Table I the security performances of the involved non side-informed and side-informed schemes against the CC-PEV-548D, MP-486D and IBC-EM-882D, with both ensemble and SVM classifiers, for JPEG quality factor 75. Again, for all cases, J-UNI achieves the best security performance. For CC-PEV-548D and MP-486D with both ensemble and SVM classifiers, both JC-UED and SC-UED have considerably better performance than that of nsf5 for all tested payloads, and JC-UED outperforms MOD for medium and
10 Fig. 7. Detection errors as a function of relative payload for nsf5, MOD, J-UNI, SC-UED and JC-UED on BOSSbase with CC-JRM-22,510D and ensemble classifier for (a) QF = 75, (b) QF = 85 and (c) QF = 95. MOD, J-UNI, SC-UED and JC-UED are ternary STC coded. Fig. 8. Detection errors as a function of relative payload for MME, BCH, BCHopt, EBS, SI-UNI and SI-UED on BOSSbase with CC-JRM-22,510D and ensemble classifier for (a) QF = 75, (b) QF = 85 and (c) QF = 95. MME, BCH, EBS and SI-UNI are binary STC coded, BCHopt is BCH coded, and SI-UED is both binary STC and BCH coded. low payloads. It is noted that the MOD is optimized to CC-PEV-548D [8]. Even under this circumstance, the JC-UED still has a better performance than the one of MOD for most of the tested payloads, and is only slightly outperformed by MOD for large data payload ( 0.4 bpac) when both JC-UED and MOD can be reliably detected by CC-PEV-548D. Table I also shows the performance of the involved non side-informed schemes against the feature set IBC-EM-882D [9], which consists of the enlarged interblock co-occurrence and the extended Markov features by increasing the corresponding threshold T, respectively, which are devised to detect the embedding changes in DCT coefficients with a large magnitude. It is observed that, for various payloads, JC-UED, SC-UED, J-UNI and nsf5 with IBC-EM-822D can achieve a better and comparable performance than their corresponding ones with CC-PEV-548D and MP-486D, whereas the performance of MOD can fall significantly when IBC-EM-822D is applied, suggesting that: 1) the distortion function in MOD is somewhat overtraining to the incomplete cover model CC-PEV-548D and can be reliably detected by the IBC-EM features; 2) the proposed UED spreads uniformly its embedding changes to all possible quantized DCT coefficients with different magnitude and thus leads to much less sudden changes even for those coefficients with relatively large magnitude. It is readily seen from Table I that, for IBC-EM-882D, the proposed JC-UED and SC-UED work considerably better than nsf5, while the MOD can still be reliably detected for all the tested payloads. It is noted that the proposed distortion function in JC-UED uses only coefficients in DCT domain without transformation to other domains, while the J-UNI uses spatial domain distortion for JPEG steganography, which is quite time-consuming. In addition, unlike the conventional approaches, the J-UNI uses all DCT coefficients as possible cover elements, and a sizeable proportion of DC and zero AC coefficients are incorporated in the J-UNI for JPEG steganography. J-UNI currently seems to work better, perhaps because there are no features yet that would detect it, especially those changes in DC and zero AC coefficients. Therefore, at least, in the framework of conventional JPEG steganography, the proposed JC-UED method can still provide the best security performance. C. Performance of Side-Informed UED For JPEG steganography with side-information, we compare the proposed SI-UED with MME [4], BCH [5], BCHopt [5], EBS [7] and recently proposed SI-UNI [10]. Fig. 8 shows the security performance of the involved schemes against the CC-JRM-22,510D, for JPEG quality factors 75, 85 and 95. Note that the schemes in Fig. 8(a) (c) are all binary STC coded except the BCHopt for fair comparison. By BCH and
11 Fig. 9. Detection errors as a function of relative payload for SC-UED, JC-UED and SI-UED on BOSSbase with CC-JRM-22,510D and ensemble classifier for (a) QF = 75, (b) QF = 85 and (c) QF = 95. SC-UED and JC-UED are ternary STC coded, while SI-UED is binary STC coded. BCHopt, we mean the baseline distortion function and its enhanced version used in [5] for non zero AC coefficients and all possible AC coefficients (non-zero and zero ACs), respectively. As in the non side-informed case, the SI-UNI achieves the best security performance for almost all cases except that it is slightly outperformed by the SI-UED when the payload is 0.10 bpac for JPEG quality factor 95, while the proposed SI-UED has a significantly better performance than the ones of MME and BCH and outperforms EBS by a clear margin for all tested payloads. Note that BCHopt can only be implemented with fast BCH syndrome coding and has long been known as one of the most secure side-informed steganographic schemes for its heuristic optimization [5]. To verify the superiority of SI-UED is irrelevant to the used code, Fig. 8(a) (c) further compare the SI-UED with BCHopt when both of the schemes are BCH coded. Again, the SI-UED performs much better than BCHopt for all tested payloads across all three quality factors. We also report the security performances of the involved side-informed schemes against the CC-PEV-548D, MP-486D and IBC-EM-882D, for JPEG quality factor 75 in Table I. Again SI-UNI achieves the best security performance, and the SI-UED outperforms all other schemes when encoded with binary STC, and also outperforms the BCHopt when encoded with BCH code for all tested payloads and classifiers. The pros and cons between SI-UED and SI-UNI are similar to the ones between JC-UED and J-UNI as described in Section V.B. Fig. 9 illustrates the performance comparison of the non side-informed SC-UED and JC-UED, and the side-informed SI-UED, against the feature set CC-JRM-22,510D with quality factors 75, 85 and 95. For almost all the cases, the SI-UED with binary STC achieves the best performance, even though the SC-UED and JC-UED are both ternary STC coded, indicating that the precover as side information may contribute more to the improvement of the security performance than simply increasing the coding efficiency by using M-ary Code. VI. CONCLUSION Minimal-distortion embedding framework is a practical approach to implement JPEG steganography with high embedding efficiency. In this paper, an efficient JPEG steganographic scheme which utilizes syndrome trellis coding (STC) and uniform embedding (UE) strategy is presented. The uniform embedding is similar in spirit to spread spectrum communication. By uniformly spreading the embedding modifications to quantized DCT coefficients of all possible magnitudes, the average changes of first- and second-order statistics are possibly minimized, especially in the small coefficients, which leads to less statistical detectability, and hence, more secure steganography. A class of new distortion functions known as uniform embedding distortion function (UED) for both non side-informed and side-informed JPEG steganography are developed to incorporate the uniform embedding. The JC-UED for non side-informed embedding takes into account the magnitude of DCT coefficient as well as both its intraand inter-block neighborhood coefficients, while the SI-UED for side-informed embedding further explores the additional rounding error besides the requirement of uniform embedding. Extensive experiments have been carried out to demonstrate the superior performance of the proposed scheme in terms of secure embedding payload against steganalysis. Finally, it is worthwhile to note that, the inappropriate use of DC and zero AC coefficients in JPEG steganography may lead to additional block artifacts in stego image and decrease in the efficiency of JPEG compression, respectively. That is why the most existing JPEG steganographic schemes use only non-zero AC coefficients as possible cover elements to make the embedding naturally content-adaptive. With the carefully devised distortion function, however, the embedding should be made artificially content-adaptive in principle. According to some of our experiments, some DC and zero AC coefficients in the texture regions could indeed be incorporated to further data embedding without decreasing, even increasing the security performance. While the UED proposed in this paper could by no means tackle all of these issues, it raises a quite challenging open question, that is how to evaluate the embedding costs of all possible DCT coefficients (including DCs, zero and nonzero ACs) based solely on the coefficients in the DCT domain for JPEG steganography, which remains as the topic of our future research effort. ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and associate editor for their comments that greatly improved the manuscript.
12 REFERENCES [1] T. Filler, J. Judas, and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp , Sep [2] A. Westfeld, F5 A steganographic algorithm, in Proc. 4th Inf. Hiding Conf., vol , pp [3] J. Fridrich, T. Pevný, and J. Kodovský, Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities, in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp [4] Y.Kim,Z.Duric,andD.Richards, Modifiedmatrixencoding technique for minimal distortion steganography, in Proc. 8th Inf. Hiding Conf., vol Jul. 2006, pp [5] V. Sachnev, H. J. Kim, and R. Zhang, Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding, in Proc. 11th ACM Workshop Multimedia Security, Sep. 2009, pp [6] T. Filler and J. Fridrich, Design of adaptive steganographic schemes for digital images, Proc. SPIE, vol. 7880, p F, Jan [7] C. Wang and J. Ni, An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients, in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp [8] J. Kodovský and J. Fridrich, Calibration revisited, in Proc. 11th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2009, pp [9] J. Kodovský, J. Fridrich, and V. Holub, On dangers of overtraining steganography to incomplete cover model, in Proc. 13th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2011, pp [10] V. Holub and J. Fridrich, Digital image steganography using universal distortion, in Proc. 1st ACM Workshop Inf. Hiding Multimedia Security, 2013, pp [11] J. Kodovský and J. Fridrich, Steganalysis of JPEG images using rich models, Proc. SPIE, vol. 8303, p A, Jan [12] J. Kodovský, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Trans. Inf. Forensics Security, vol.7, no. 2, pp , Apr [13] C. Chen and Y. Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations, in Proc. IEEE Int. Symp. Circuits Syst., Mar. 2008, pp [14] L. Guo, J. Ni, and Y. Q. Shi, An efficient JPEG steganographic scheme using uniform embedding, in Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Tenerife, Spain, Dec. 2012, pp [15] P. Bas, T. Filler, and T. Pevný, Break our steganographic system The ins and outs of organizing boss, in Proc. 13th Inf. Hiding Conf., 2011, pp [16] N. Provos, Defending against statistical steganalysis, in Proc. 10th USENIX Security Symp., Washington, DC, USA, 2001, pp [17] D. Freedman, Statistical Models: Theory and Practice. Cambridge, U.K.: Cambridge Univ. Press, [18] C.-C. Chang and C.-J. Lin, LIBSVM: A library for support vector machines, ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 27:1 27:27, Linjie Guo (S 12) received the B.S. degree in engineering from the South China University of Technology, Guangzhou, China, in He is currently pursuing the Ph.D. degree with the School of Information Science and Technology, Sun Yat-sen University, Guangzhou. His current research interests include steganography, steganalysis, and multimedia security. Jiangqun Ni (M 12) received the Ph.D. degree in electronic engineering from the University of Hong Kong, Hong Kong, in He was a Post-Doctoral Fellow for a joint program between the Sun Yat-sen University, Guangzhou, China, and the Guangdong Institute of Telecommunication Research from 1998 to Since 2001, he has been with the School of Information Science and Technology, Sun Yat-sen University, where he is currently a Professor. His research interests include data hiding and digital image forensics, image-based modeling and rendering, and image/video processing. He has authored more than 50 papers in these areas. Yun Qing Shi (M 88 SM 92 F 05) has been with the New Jersey Institute of Technology, USA, since He received the M.S. degree from Shanghai Jiao Tong University, China, and the Ph.D. degree from the University of Pittsburgh, USA. His research interests include digital data hiding, forensics and information assurance, and visual signal processing and communications. He has authored and coauthored more than 300 papers, one book, and five book chapters, and has edited 10 books. He holds 28 U.S. patents. He received the Innovators Award 2010 from the New Jersey Inventors Hall of Fame for Innovations in Digital Forensics and Security. His U.S. patent 7,457,341 titled System and Method for Robust Reversible Data Hiding and Data Recovery in the Spatial Domain received the 2010 Thomas Alva Edison Patent Award from the Research and Development Council of New Jersey. He served as an Associate Editor of the IEEE TRANSACTIONS ON SIGNAL PROCESSING and IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS (II), and a few other journals, the Technical Program Chair of the 2007 IEEE International Conference on Multimedia and Expo, a Co-Technical Chair of the 2006, 2007, and International Workshop on Digital Watermarking, and the 2005 IEEE International Workshop on Multimedia Signal Processing (MMSP), a Co-General Chair of the 2002 IEEE MMSP, and a Distinguished Lecturer of the IEEE Circuits and Systems Society. He is a member of a few IEEE technical committees.
A Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationModern Steganalysis Can Detect YASS
Jan Kodovský, Tomáš Pevný, Jessica Fridrich January 18, 2010 / SPIE 1 / 13 YASS Curriculum Vitae Birth Location: University of California, Santa Barbara Birth Date: More than 2 years ago [Solanki-2007],
More informationYET Another Steganographic Scheme (YASS) [1] is a
374 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 An Experimental Study on the Security Performance of YASS Fangjun Huang, Member, IEEE, Jiwu Huang, Senior Member,
More informationAdaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain Ningbo Li, Pan Feng, Liu Jia
216 International Conference on Information Engineering and Communications Technology (IECT 216) ISBN: 978-1-69-37- Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationA Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.27-31 A Blind Steganalysis on JPEG Gray Level
More informationOptimizing Pixel Predictors for Steganalysis
Optimizing Pixel Predictors for Steganalysis Vojtěch Holub and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IS&T / SPIE 2012, San Francisco, CA Steganography
More informationQuantitative and Binary Steganalysis in JPEG: A Comparative Study
Quantitative and Binary Steganalysis in JPEG: A Comparative Study Ahmad ZAKARIA LIRMM, Univ Montpellier, CNRS ahmad.zakaria@lirmm.fr Marc CHAUMONT LIRMM, Univ Nîmes, CNRS marc.chaumont@lirmm.fr Gérard
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationDefining Cost Functions for Adaptive Steganography at the Microscale
Defining Cost Functions for Adaptive Steganography at the Microscale Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu CAS Key Laboratory of Electromagnetic Space Information University of Science and
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationSTEGANOGRAPHY is a technique for covert communication,
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 0.09/TCSVT.206.2587388,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationLETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration
IEICE TRANS. INF. & SYST., VOL.E96 D, NO.5 MAY 2013 1233 LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration Kazumi YAMAWAKI, Member, Fumiya NAKANO, Student
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationAlpha-trimmed Image Estimation for JPEG Steganography Detection
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Alpha-trimmed Image Estimation for JPEG Steganography Detection Mei-Ching Chen,
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationEvolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD) Evolving Distortion Function By Exploiting The Differences Among Comparable Adaptive Steganography
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationIEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH
IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 69 Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission Shaoquan Wu, Jiwu Huang, Senior Member, IEEE, Daren
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationDefining Cost Functions for Adaptive JPEG Steganography at the Microscale
1052 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 4, APRIL 2019 Defining Cost Functions for Adaptive JPEG Steganography at the Microscale Kejiang Chen, Hang Zhou, Wenbo Zhou, Weiming
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationarxiv: v1 [cs.mm] 2 Mar 2017
This is a preprint of the paper: arxiv:1703.00817v1 [cs.mm] 2 Mar 2017 Daniel Lerch-Hostalot, David Megías, LSB matching steganalysis based on patterns of pixel differences and random embedding, Computers
More informationCONTENT ADAPTIVE SCREEN IMAGE SCALING
CONTENT ADAPTIVE SCREEN IMAGE SCALING Yao Zhai (*), Qifei Wang, Yan Lu, Shipeng Li University of Science and Technology of China, Hefei, Anhui, 37, China Microsoft Research, Beijing, 8, China ABSTRACT
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationOvercompressing JPEG images with Evolution Algorithms
Author manuscript, published in "EvoIASP2007, Valencia : Spain (2007)" Overcompressing JPEG images with Evolution Algorithms Jacques Lévy Véhel 1, Franklin Mendivil 2 and Evelyne Lutton 1 1 Inria, Complex
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationOn dangers of cross-validation in steganalysis
Jan Kodovský jan.kodovsky@binghamton.edu Abstract Modern steganalysis is a combination of a feature space design and a supervised binary classification. In this report, we assume that the feature space
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationAN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS
AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.
More informationSteganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes
Multimed Tools Appl (2016) 75:13557 13583 DOI 10.1007/s11042-015-2759-2 Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes Xiangyang Luo 1,2 & Xiaofeng Song 1,2
More informationCalibration Revisited
Calibration Revisited Jan Kodovský SUNY Binghamton Department of ECE Binghamton, NY 1392-6 jan.kodovsky@binghamton.edu Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 1392-6 fridrich@binghamton.edu
More informationA Steganography method for JPEG2000 Baseline System
A Steganography method for JPEG2000 Baseline System P.Ramakrishna Rao M.Tech.,[CSE], Teaching Associate, Department of Computer Science, Dr.B.R.Ambedkar University, Etcherla Srikaulam, 532 410. Abstract
More informationCODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala
CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In
More informationFurther Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis
Further Study on YASS: Steganography Based on Randomized Embedding to Resist Blind Steganalysis Anindya Sarkar, Kaushal Solanki and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationLOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS. Qiuyan Lin, Jiaying Liu and Zongming Guo
LOCAL TERNARY PATTERN BASED ON PATH INTEGRAL FOR STEGANALYSIS Qiuyan Lin, Jiaying Liu and Zongming Guo Institute of Computer Science and Technology, Peking University, Beijing 87, China ABSTRACT The least
More informationCalibration Revisited
Jan Kodovský, Jessica Fridrich September 7, 2009 / ACM MM&Sec 09 1 / 16 What is Calibration? 2002 - Calibration introduced (attack on F5) Part of feature extraction procedure for blind steganalysis Idea:
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationExpress Letters. A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation. Jianhua Lu and Ming L. Liou
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 7, NO. 2, APRIL 1997 429 Express Letters A Simple and Efficient Search Algorithm for Block-Matching Motion Estimation Jianhua Lu and
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi a, Husrev T. Sencar b Nasir Memon b a Department of Electrical and Computer Engineering b Department of Computer and Information Science
More informationA Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS
A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong
More informationACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images
ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationOn the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography
On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography Ainuddin Wahid Abdul Wahab, Johann A Briffa and Hans Georg Schaathun Department of Computing, University of Surrey Abstract.
More informationIvans Lubenko & Andrew Ker
Ivans Lubenko & Andrew Ker lubenko@ comlab.ox.ac.uk adk@comlab.ox.ac.uk Oxford University Computing Laboratory SPIE/IS&T Electronic Imaging, San Francisco 25 January 2011 Classification in steganalysis
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationJPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images
JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University
More informationIMAGE COMPRESSION USING ANTI-FORENSICS METHOD
IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationA Novel Message Decomposing and Embedding Scheme for Image Steganography
Journal of Computers Vol. 29 No. 2, 2018, pp. 241-248 doi:10.3966/199115992018042902023 A Novel Message Decomposing and Embedding Scheme for Image Steganography Zhihai Zhuo 1*, Ning Zhong 2, Hongxia Miao
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationHigh capacity data hiding scheme based on (7, 4) Hamming code
DOI 10.1186/s40064-016-1818-0 RESEARCH Open Access High capacity data hiding scheme based on (7, 4) Hamming code Zekun Cao 1, Zhaoxia Yin 1,2*, Honghe Hu 1, Xiangping Gao 1 and Liangmin Wang 1 *Correspondence:
More informationImage and Video Watermarking
Telecommunications Seminar WS 1998 Data Hiding, Digital Watermarking and Secure Communications Image and Video Watermarking Herbert Buchner University of Erlangen-Nuremberg 16.12.1998 Outline 1. Introduction:
More informationContext based optimal shape coding
IEEE Signal Processing Society 1999 Workshop on Multimedia Signal Processing September 13-15, 1999, Copenhagen, Denmark Electronic Proceedings 1999 IEEE Context based optimal shape coding Gerry Melnikov,
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationCompression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction
Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada
More informationForensic analysis of JPEG image compression
Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic
More informationWith ever-increasing growth of electronic
Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Parallelization of Rich Models for Steganalysis of Digital Images using a CUDA-based Approach Mahmoud Kazemi 1, Meysam Mirzaee 2, Reza
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationA Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The
More informationWhich gray level should be given the smallest cost for adaptive steganography?
DOI 10.1007/s11042-017-4565-5 Which gray level should be given the smallest cost for adaptive steganography? Yao Wei 1,2 Weiming Zhang 1 Weihai Li 1,2 Nenghai Yu 1,2 Xi Sun 1,2 Received: 9 September 2016
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationDESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED VITERBI ALGORITHM *
International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 3, No. 2, pp. 5, 26 DESIGN OF HIGH SPEED STEGOSYSTEM BASED ON TRELLIS CODES JOINTLY WITH GENERALISED
More informationThe Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients
Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression
More informationSINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC
SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationBenchmarking steganographic and steganalysis techniques
Benchmarking steganographic and steganalysis techniques Mehdi Kharrazi, Husrev T. Sencar, Nasir Memon I. INTRODUCTION There have been a range of image based steganographic embedding techniques proposed
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationImproved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction
Improved Reversible Data Hiding in Encrypted Images Based on Reserving Room After Encryption and Pixel Prediction Ioan Catalin Dragoi, Henri-George Coanda and Dinu Coltuc Electrical Engineering Dept. Valahia
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationMerging Markov and DCT Features for Multi-Class JPEG Steganalysis
Merging Markov and DCT Features for Multi-Class JPEG Steganalysis Tomáš Pevný a, Jessica Fridrich b a Department of Computer Science, Binghamton University, State University of New York b Department of
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationAn Efficient Image Compression Using Bit Allocation based on Psychovisual Threshold
An Efficient Image Compression Using Bit Allocation based on Psychovisual Threshold Ferda Ernawan, Zuriani binti Mustaffa and Luhur Bayuaji Faculty of Computer Systems and Software Engineering, Universiti
More informationDATA hiding [1] and watermarking in digital images
14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,
More informationSTeganography is a technique for covert communication,
1 A New Rule for Cost Reassignment in Adaptive Steganography Wenbo Zhou, Weiming Zhang, and Nenghai Yu Abstract In steganography schemes, the distortion function is used to define modification costs on
More informationSteganalysis in the Presence of Watermarked Images
2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing Steganalysis in the Presence of Watermarked Images Pham Hai Dang Le, Daniel Graf, and Matthias O.
More informationImage Segmentation Techniques for Object-Based Coding
Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationDCT Based Texture Synthesis Oriented Steganography
DCT Based Texture Synthesis Oriented Steganography SK. Karthika Assistant Professor, CSE TRP Engineering College G.Subashini Department of CSE TRP Engineering College P.B.Shanmathi Department of CSE TRP
More information